CA Top Secret r15 for z/os

Size: px
Start display at page:

Download "CA Top Secret r15 for z/os"

Transcription

1 PRODUCT SHEET: CA TOP SECRET FOR z/os we can CA Top Secret r15 for z/os CA Top Secret for z/os (CA Top Secret ) provides innovative, comprehensive security for your business transaction environments, including z/os Unix and mainframe Linux helping your business realize the reliability, scalability and cost-effectiveness of the mainframe. In conjunction with CA Technologies distributed security solutions, CA Top Secret helps secure your entire enterprise. Overview There is increased concern about the security issues that arise when establishing Web links to valuable mainframe data. Many organizations are also required to comply with government regulations, including HIPAA, SOX, PCI and GLBA, and existing corporate policies and industry agreements. With the introduction of new technologies for the mainframe, new security and compliance concerns are rapidly developing. To stay abreast of today s challenges, organizations must strengthen security, streamline administration and provide enhanced auditing and compliance capabilities. Benefits CA Top Secret delivers out-of-the-box access control software for z/os operating systems, which includes interfaces for CICS, z/os Unix (formerly known as OMVS) and IMS (and an optional add-on for DB2). CA Top Secret mechanisms provide flexibility and control to help you monitor and adjust your security policies and accommodate virtually all organizational structures. Administrative tools, extensive reporting options, online monitoring and automatic logging capabilities accompany CA Top Secret to secure your environment while enabling comprehensive auditing and controlled sharing of data and resources.

2 Mainframe 2.0 CA Top Secret has adopted key Mainframe 2.0 features that are designed to simplify your use of CA Top Secret and enable your staff to install, deploy and maintain it more effectively and quickly. CA Mainframe Software Manager: The CA Mainframe Software Manager (CA MSM) automates CA Top Secret installation, deployment and maintenance and removes SMP/E complexities. The Software Acquisition Service enables you to easily move product installation packages and maintenance from CA Support Online directly to your mainframe environment and prepare them for installation. The Software Installation Service standardizes CA Top Secret installation, which includes a new, streamlined Electronic Software Delivery (ESD) method that allows CA Top Secret to be installed using standard utilities. This service also provides standardized SMP/E product installation and maintenance via APARs and PTFs, and simplifies SMP/E processing through an intuitive graphical user interface and an intelligent Installation Wizard. The Software Deployment Service enables you to easily deploy CA Top Secret in your mainframe environment. CA MSM Consolidated Software Inventory (CSI) updates and infrastructure improvements add flexibility to CA MSM processing of CSIs and enable CA MSM to more effectively utilize CPU and system memory. Installation Verification Program (IVP) and Execution Verification Program (EVP): As part of qualification for inclusion in the set of mainframe products released every May from CA Technologies, CA Top Secret has passed stringent tests performed through the IVP and EVP to find and resolve interoperability problems prior to release. These programs are an extension of the CA Technologies ongoing interoperability certification initiative launched in May Best Practices Guide: This guide provides information on CA Top Secret installation, initial configuration and deployment to shorten the learning curve for staff who are responsible for the installation and management of this product. Health Checker: The Mainframe 2.0 Health Checker provides CA Top Secret Health Checks that execute under the IBM Health Checker for z/os. The CA Top Secret Health Checker is a valuable tool to identify potential problems before they impact your availability or, worst case, cause system outages. It checks the current active CA Top Secret settings and definitions for a system and compares the values to those suggested by CA Technologies or defined by you. 02

3 CA Top Secret Safeguards Your Data Information security is critical to achieving business efficiency and growth, superior customer service and information privacy. Today, organizations view technology as a strategic resource and seek to gain competitive advantage by providing easier, faster and more reliable access to products and services. A secure, reliable and cost-effective security infrastructure is essential for the execution of today s business strategies. Many organizations are rightly concerned about the security issues that arise when establishing Web links to valuable mainframe databases. CA Top Secret addresses these concerns by helping IT organizations exploit the latest hardware, networking and operating system components offered for the mainframe. CA Top Secret is designed to protect your mainframe computer systems and data by controlling access to resources. It closely maps security to how you manage your organization by using a flexible configuration mechanism unique to CA Technologies that automatically associates users to one or more roles. CA Top Secret delivers flexible, streamlined administration, helping you to quickly and efficiently manage users and control resources. In addition, it enables rapid, costeffective response to changing business needs. CA Top Secret is delivered complete with flexible and powerful administrative tools, automatic logging facilities, and extensive reporting and online monitoring capabilities. Authorized individuals are provided with a wide range of opportunities to analyze and evaluate computer access activities and trends. Administrators can quickly and easily set and adjust security policies to respond to rapidly changing business needs. 03

4 CA Web Administrator for Top Secret ACID and Access Right tabs in CA Top Secret using CA Web Administrator 04

5 What s New CA Top Secret r15 for z/os delivers and builds on product integration with CA Mainframe Software Manager (MSM) and CA Distributed Security. Key Capabilities Comprehensive Security CA Top Secret provides comprehensive security for z/os resources across operating systems, subsystems, OEM software and databases. Operating System Release Support CA Top Secret support is planned for new operating system releases as they become generally available. Exploitation Of New Releases CA Top Secret takes advantage of new features and functions to provide enhanced security administration and management functionality. Inclusive User Management Individual accountability is the key to effective information security. Many government regulations and corporate policies require separation of functions or duties. CA Top Secret lets you decide what policies are relevant and implement those structures. Note: CA does not provide legal advice. No software product referenced herein serves as a substitute for your compliance with any laws (including but not limited to any act, statute, regulation, rule, directive, standard, policy, administrative order, executive order, and so on (collectively, Laws ) referenced herein or any contract obligations with any third parties. You should consult with competent legal counsel regarding any such Laws or contract obligations. Users CA Top Secret provides easy-to-use administration functions that adapt to your organization s structure and procedures to support compliance with regulations and laws. Role-Based Security The profile ACID is the implementation of role-based security in CA Top Secret; it is flexible and allows you to adapt to your organization s changes. Individual Accountability Users are protected by a password. Consistent password policies are enforced throughout your organization, strengthening the effectiveness of passwords and increasing information security. System Entry CA Top Secret controls entry into virtually all z/os subsystems and VTAM/TCPIP applications, including TSO, batch, z/os UNIX, mainframe Linux, CICS, IMS DB2 for z/os and more. Certificate Management To help you reduce the administration time and effort needed to support digital certificates, CA Top Secret lets you store, generate, administer and process certificate requests. In addition, the CA Distributed Security Integration Server for z/os (CA DSI) component added the ability to store, connect certificates to key rings and delete certificates from CA Top Secret using the provided SDK. This allows for integration with the Certificate Authority of your choice. Data And Resource Management Your data center managers are responsible for helping to ensure the integrity of all data and programs stored on their computer systems. Any data loss can potentially translate into financial loss. 05

6 Protection By Default CA Top Secret is designed to protect data sets and selected resource classes by default if the DEFPROT attribute is specified. CA Top Secret will also protect all resources once ownership has been established. Controlled Sharing Of Data CA Top Secret requires that you grant permission to allow access to resources. This process enables you to know and control who has access to what. Data Classification There is an increasing number of regulations pertaining to the secure access of data. The Health Insurance Portability and Accountability Act (HIPAA) dictates the type of data that must be kept confidential for patients. The Family Educational Rights and Privacy Act (FERPA) describes the data that can be accessed from a student s educational records. There are also many other regulations (SOX, FISMA, FFIEC, etc.) that can pertain to secure data. CA Top Secret provides tracking records that help determine what data (files, data sets and resources) pertain to which regulation. Auditing And Monitoring Several laws and industry-wide regulations in many countries require organizations to establish internal controls pertaining to computerized data. CA Top Secret includes a variety of audit functions that provide information and capabilities to help you monitor access and access rights. Auditing CA Top Secret generates audit records for virtually any security related event. These include: starts and stops of the security system, any command to modify the running security system, successful or unsuccessful user system entry or exit, failed or audited data set access, failed or audited resource access, changes to the security databases and any security-related z/os UNIX events. In addition, CA Top Secret provides the WHOHAS command to facilitate the requirement to quickly review access to data or resources. Reports CA Top Secret provides a comprehensive set of reports that let you view and analyze your security event information. In addition, it allows you to limit the output of a particular report according to the privileges and restrictions of the specific user who is executing the report. Separation of Administrative Functions While the implementation of security is very important, so is the responsibility for security administration. Restricting who can grant access and define your users is a cornerstone for effective security. CA Top Secret provides separation of security administration functions and duties and an additional management control that safeguards your systems. CA Top Secret also helps preserve the integrity of your security records. Decentralized Or Centralized Administration CA Top Secret delivers several ways for you to separate security administration functions. It provides you with different levels of administrative authority (privileges) over your users and resources. In addition, it can scope or limit privileges to discrete security functions, areas or resources. Changes To Security Standard reports display updates, additions, changes or deletions of any CA Top Secret user or permission, or other security records. Administration Diversity Without proper administration, there can be no guarantee that your 06

7 security is structured correctly. To help meet your business requirements and ease the administration process, CA Top Secret includes flexible and powerful administration tools. Command Processing CA Top Secret allows you to administer security in multiple ways, such as TSO, batch, CICS, IMS, CA Identity Manager and CA Web Administrator for Top Secret. Multiple Image Security Administration In an environment with multiple system images, you can send CA Top Secret commands from one node to single or multiple nodes. This is accomplished through the CA Top Secret Command Propagation Facility (CPF). Security Information Sharing To reduce security administration, human error and costs, security information must be shared across a networked environment. CA Top Secret works with other solutions to provide comprehensive information security across your network. CA LDAP Server for z/os (CA LDAP Server) This component provides a single interface for applications to request security services, including adding, updating and retrieving information. It can be used to securely perform user authentication on behalf of business applications running on z/os and other platforms connected through TCP/IP. You can leverage the existing information stored in your z/os security solution and achieve mainframe-strength user authentication for applications throughout the enterprise by connecting to CA Top Secret through CA LDAP Server. LDAP Directory Services (LDS) LDS provides flexible sharing of CA Top Secret administrative changes to remote security repositories residing on distributed platforms. CA Distributed Security Integration (CA DSI) While the LDAP Server provides an interface to security services, it is limited to what the LDAP protocol supports. The CA DSI Server was created to provide the following additional functionality while restricting access using native security scoping: CERT2UID Maps a digital certificate to a user ID using the External Security Manager (ESMs). The digital certificate must reside in the ESM for this function to succeed. DATAPUT Adds a certificate to the database and connects it to a key ring. If the specified key ring does not exist, an attempt is made to create the key ring. DATAREMOVE Removes a certificate from a key ring. You can also indicate that the certificate should be removed from the database. For it to be deleted from the database, it cannot be connected to any other key rings. DELETERING Deletes a key ring. GETPNL Retrieves the groups associated with a LID. (This is CA ACF2 specific.). GETVER Gets the product name and version of the ESM that is currently running. MAPUID Maps a long user name to a short name or a short name to a long name using the ESMs. NEWRING Creates a new key ring. 07

8 PASSCHK Performs user ID and password authentication to the ESM. PURGERING Removes all certificates from an existing key ring. RESCHK Performs a resource authorization check to the ESM. XEQCMD Issues native commands to the ESM using the same native syntax as TSO or batch. LINUX On System z Support CA Pluggable Authentication Module (CA PAM) allows CA Top Secret to act as an authentication server for one or more Linux systems, eliminating the need for redundant security administration to define users on a system-by-system basis. CA PAM Client for Linux for System z can authenticate to CA Top Secret for z/os or z/vm. IBM Policy Director (PDAS) CA Top Secret utilizes the common SAF interface to support customers usage of IBM Policy Director. CA Web Administrator for Top Secret CA Top Secret customers have had limited, text based, options for maintaining their z/os security information. With the retirement of knowledgeable security administrators, customers are trying to maintain their systems using less experienced and non-mainframe personnel. Something is needed to help these new administrators accomplish what is needed in a faster and easier manner than reading the 1,000 page administrator guide and trying to determine the correct command syntax. The CA Web Administrator for Top Secret provides a browser-based GUI to help these new administrators. The CA Web Administrator for Top Secret is designed to provide a comprehensive administration solution for CA Top Secret using a browser-based GUI. The CA Web Administrator: Provides the ability to communicate with CA Top Secret through the CA LDAP Server. Enables administration to be performed in real time against live CA Top Secret data. Provides the ability to administer CA Top Secret anywhere that you have an accessible browser, using SSL for security. Allows administrators to input native commands directly from the GUI and receive output if desired. Restricts data access using native security scoping. Provides the ability to issue console commands during pre- and post-processing of any record. Simplifies administration so there is no need to memorize native commands or hundreds of fields. Lowers the learning curve for new administrators. Allows activity to be logged for auditing purposes, via native SMF records. 08

9 What s New with CA Top Secret r15 for z/os function/features CA Mainframe Software Manager New Utility and Documentation for Enhanced Role-based Security Restricted Administrative Privileges Administrative Archive User Modeling Virtual Storage Constraint Relief Serviceability benefits CA MSM simplifies and unifies the management of CA Technologies mainframe products on z/os systems and is an integral component of the MF 2.0 solutions for the z/os operating system. As z/os products adopt the services provided by CA MSM, you can acquire, install, and maintain them in a common way. These services enable you to manage your software easily, based on industry accepted best practices such as SMP/E, FTP, USS and Java. Easier administration. 1) A RENEW command to simplify the administration of renewing certificates that are defined on the Top Secret database 2) Expanded size limits of the IDN/SDN extensions 3) Certificate Utility now displays all Certificate extensions The ability to create limited security officers. For example, helpdesk personnel can be created who only administer password resets and passwordrelated fields, or users who are only authorized to issue digital certificate related commands. The ability to automatically generate archival commands during a security administrator s list or removal of a user. The user security record with all associated user profile data as well as all profiles the user is associated with are captured and commands are generated that can be used to restore the user to an original status if needed. The ability to automatically model one user to create another, including user profile information, permissions and profiles. This can be extremely useful when users switch roles or new users are created. Improved storage utilization and increased performance through exploitation of above-the-bar 64-bit storage. Additional diagnostic capabilities help CA Support identify product release and maintenance status. 09

10 The CA Technologies Advantage Mainframe Security products from CA Technologies are integrated components of the comprehensive Security Management solution set that enables customers to easily manage and protect IT assets across all platforms and environments. By leveraging this end-to-end Security Management solution, organizations can centralize user identity administration, provisioning and access management across the enterprise to improve IT efficiency, reduce IT costs and enhance user productivity. This solution also enables security administrators to view consolidated cross-platform security events for enhanced auditing and compliance and faster response to security risks and incidents. To optimize the performance, reliability and efficiency of your overall IT environment, you need to tightly integrate the control and management of distinct functions, such as operations, storage, and lifecycle and service management, along with IT security and identity and access management capabilities. CA Mainframe Security helps provide a consistent and secure platform across your entire IT environment, including emerging technologies that you might adopt in the near future. CA Technologies has been a leader in IT management for over 30 years, has over 1000 security customers, and is committed to continuing to bring innovative security capabilities to them. We have a very large and dedicated group of security experts who know how to make security deployments successful, and help our customers achieve very quick time-to-value. Next steps If you re finding that: You need to strengthen security You are struggling with the costs and effort required for compliance with relevant industry and regulatory requirements Budgetary pressures are demanding greater efficiencies in your administrative functions You are concerned about potential risks and need to enhance auditing capabilities then take a look at CA Top Secret r15 for z/os. When combined with other CA Technologies solutions, CA Top Secret provides end-to-end controls to help your organization address business and compliance requirements across the enterprise. Visit us at ca.com/mainframe/security today. Copyright 2010 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. This document is for your informational purposes only. CA assumes no responsibility for the accuracy or completeness of the information. To the extent permitted by applicable law, CA provides this document as is without warranty of any kind, including, without limitation, any implied warranties of merchantability, fitness for a particular purpose, or non-infringement. In no event will CA be liable for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits, business interruption, goodwill or lost data, even if CA is expressly advised in advance of the possibility of such damages. 2840_

CA Mainframe Security Management solutions helps you reduce costs, facilitate new business opportunities, address regulatory compliance requirements,

CA Mainframe Security Management solutions helps you reduce costs, facilitate new business opportunities, address regulatory compliance requirements, SOLUTION BRIEF CA Mainframe Security Management Solutions September 2010 how can mainframe security management solutions from CA Technologies help me simplify and unify security? we can CA Mainframe Security

More information

Enterprise Report Management CA View, CA Deliver, CA Dispatch, CA Bundl, CA Spool, CA Output Management Web Viewer

Enterprise Report Management CA View, CA Deliver, CA Dispatch, CA Bundl, CA Spool, CA Output Management Web Viewer PRODUCT FAMILY SHEET Enterprise Report Management Enterprise Report Management CA View, CA Deliver, CA Dispatch, CA Bundl, CA Spool, CA Output Management Web Viewer CA Technologies provides leading software

More information

CA Compliance Manager for z/os

CA Compliance Manager for z/os PRODUCT SHEET CA Compliance Manager for z/os CA Compliance Manager for z/os CA Compliance Manager for z/os (CA Compliance Manager) provides your organization with a single source for real-time, compliancerelated

More information

CA TPX Session Management r5.3

CA TPX Session Management r5.3 PRODUCT SHEET CA TPX Session Management CA TPX Session Management r5.3 CA TPX Session Management (CA TPX) helps you manage user menus for accessing VTAM applications on the mainframe while offering end

More information

CA Scheduler Job Management r11

CA Scheduler Job Management r11 PRODUCT SHEET CA Scheduler Job Management CA Scheduler Job Management r11 CA Scheduler Job Management r11 (CA Scheduler JM), part of the Job Management solution from CA Technologies, is a premier z/oscentric

More information

CA NetMaster Network Management for TCP/IP r12.0

CA NetMaster Network Management for TCP/IP r12.0 PRODUCT sheet: CA NETMASTER NETWORK MANAGEMENT FOR TCP/IP r12.0 CA NetMaster Network Management for TCP/IP r12.0 CA NetMaster Network Management for TCP/IP (CA NetMaster for TCP/IP) delivers capabilities

More information

CA SYSVIEW Performance Management r13.0

CA SYSVIEW Performance Management r13.0 PRODUCT SHEET CA SYSVIEW Performance Management CA SYSVIEW Performance Management r13.0 CA SYSVIEW Performance Management (CA SYSVIEW) simplifies mainframe performance management and improves responsiveness

More information

CA NetSpy Network Performance r12

CA NetSpy Network Performance r12 PRODUCT SHEET CA NetSpy Network Performance CA NetSpy Network Performance r12 CA NetSpy Network Performance (CA NetSpy) enables organizations to more efficiently manage the performance of their SNA networks.

More information

CA Workload Automation CA 7 Edition r11.3

CA Workload Automation CA 7 Edition r11.3 PRODUCT SHEET CA Workload Automation CA 7 Edition CA Workload Automation CA 7 Edition r11.3 CA Workload Automation CA 7 Edition is a single-engine enterprisewide workload automation solution that allows

More information

CA Telon Application Generator r5.1

CA Telon Application Generator r5.1 PRODUCT SHEET CA Telon Application Generator CA Telon Application Generator r5.1 CA Telon Application Generator r5.1 (CA Telon AG) is an easy-tolearn, powerful application generator that provides the ability

More information

r12 Overview Business value

r12 Overview Business value PRODUCT SHEET CA 1 Tape Management CA 1 Tape Management r12 CA 1 Tape Management r12 (CA 1) provides for the management, control, and protection of z/os tape data sets and volumes. CA 1 integrates with

More information

CA Deliver r11.7. Business value. Product overview. Delivery approach. agility made possible

CA Deliver r11.7. Business value. Product overview. Delivery approach. agility made possible PRODUCT SHEET CA Deliver agility made possible CA Deliver r11.7 CA Deliver is an online report management system that provides you with tools to manage and reduce the cost of report distribution. Able

More information

CA Librarian r4.3. Overview. Business value

CA Librarian r4.3. Overview. Business value PRODUCT SHEET CA Librarian CA Librarian r4.3 CA Librarian for z/os, for z/vse and for z/vm (CA Librarian) is a highly sophisticated and flexible storage medium of source programs and other sets of data

More information

CA JCLCheck Workload Automation

CA JCLCheck Workload Automation PRODUCT SHEET CA JCLCheck Workload Automation CA JCLCheck Workload Automation CA JCLCheck Workload Automation (CA JCLCheck WA) validates z/os JCL before it is submitted for execution. CA JCLCheck WA helps

More information

CA Aion Business Rules Expert 11.0

CA Aion Business Rules Expert 11.0 PRODUCT SHEET: CA Aion Business Rules Expert CA Aion Business Rules Expert 11.0 CA Aion Business Rules Expert r11 (CA Aion BRE) is an industryleading system that automates and streamlines business functions

More information

CA Repository for z/os r7.2

CA Repository for z/os r7.2 PRODUCT SHEET CA Repository for z/os CA Repository for z/os r7.2 CA Repository for z/os is a powerful metadata management tool that helps organizations to identify, understand, manage and leverage enterprise-wide

More information

CA Endevor Software Change Manager Release 15.1

CA Endevor Software Change Manager Release 15.1 PRODUCT SHEET CA Endevor Software Change Manager CA Endevor Software Change Manager Release 15.1 agility made possible CA Endevor Software Change Manager (CA Endevor SCM) helps organizations control all

More information

CA Gener/OL r7.1. Overview. Business value

CA Gener/OL r7.1. Overview. Business value PRODUCT SHEET CA Gener/OL CA Gener/OL r7.1 CA Gener/OL is an easy-to-use CICS program and application generation system that enhances programmer productivity by automatically handling the complexities

More information

CA CMDB Connector for z/os version 2.0

CA CMDB Connector for z/os version 2.0 PRODUCT SHEET CA CMDB Connector for z/os version 2.0 CA CMDB Connector for z/os version 2.0 CA CMDB Connector for z/os is the final piece in the puzzle to create an enterprise CMDB, providing you the ability

More information

CA Encryption Key Manager r14.5

CA Encryption Key Manager r14.5 PRODUCT SHEET CA Encryption Key Manager CA Encryption Key Manager r14.5 CA Encryption Key Manager is a z/os-based, software cryptographic solution that helps ensure the highest availability of encryption

More information

CA Endevor Software Change Manager Version 15.0

CA Endevor Software Change Manager Version 15.0 PRODUCT SHEET CA Endevor Software Change Manager CA Endevor Software Change Manager Version 15.0 CA Endevor Software Change Manager (CA Endevor SCM) helps organizations to control all software management

More information

CA Aion Business Rules Expert r11

CA Aion Business Rules Expert r11 PRODUCT sheet: CA AION BUSINESS RULES EXPERT r11 CA Aion Business Rules Expert r11 CA Aion Business Rules Expert r11 (CA Aion BRE) is an industry-leading system that automates and streamlines business

More information

CA High Performance Recovery for IMS for z/os

CA High Performance Recovery for IMS for z/os PRODUCT SHEET CA High Performance Recovery for IMS for z/os CA High Performance Recovery for IMS for z/os CA High Performance Recovery for IMS for z/os (CA HPR) is designed to allow database administrators

More information

CA Workload Automation Restart Option for z/os Schedulers r11

CA Workload Automation Restart Option for z/os Schedulers r11 PRODUCT SHEET CA Workload Automation Restart Option for z/os Schedulers r11 CA Workload Automation Restart Option for z/os Schedulers r11 CA Workload Automation Restart Option for z/os Schedulers (CA WA

More information

CA Process Automation for System z 3.1

CA Process Automation for System z 3.1 PRODUCT SHEET CA Process Automation for System z CA Process Automation for System z 3.1 CA Process Automation for System z helps enable enterprise organizations to design, deploy and administer automation

More information

Version 14.0. Overview. Business value

Version 14.0. Overview. Business value PRODUCT SHEET CA Datacom Server CA Datacom Server Version 14.0 CA Datacom Server provides web applications and other distributed applications with open access to CA Datacom /DB Version 14.0 data by providing

More information

CA Insight Database Performance Monitor for DB2 for z/os

CA Insight Database Performance Monitor for DB2 for z/os PRODUCT SHEET CA Insight Database Performance Monitor for DB2 for z/os CA Insight Database Performance Monitor for DB2 for z/os CA Insight Database Performance Monitor for DB2 for z/os (CA Insight DPM)

More information

CA Explore Performance Management for z/vm

CA Explore Performance Management for z/vm PRODUCT SHEET CA Explore Performance Management for z/vm CA Explore Performance Management for z/vm CA Explore Performance Management for z/vm (CA Explore for z/vm) is a comprehensive performance management

More information

How can Identity and Access Management help me to improve compliance and drive business performance?

How can Identity and Access Management help me to improve compliance and drive business performance? SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the

More information

UPSTREAM for Linux on System z

UPSTREAM for Linux on System z PRODUCT SHEET UPSTREAM for Linux on System z UPSTREAM for Linux on System z UPSTREAM for Linux on System z is designed to provide comprehensive data protection for your Linux on System z environment, leveraging

More information

CA MICS Resource Management r12.7

CA MICS Resource Management r12.7 PRODUCT SHEET agility made possible CA MICS Resource Management r12.7 CA MICS Resource Management (CA MICS) is a comprehensive IT resource utilization management system designed to fulfill the information

More information

CA Chorus Software Manager Update

CA Chorus Software Manager Update CA Chorus Software Manager Update Summer Spaulding March 12, 2014 Session: 15259 2014 CA. All rights reserved. Abstract CA Chorus Software Manager (formerly known as CA Mainframe Software Manager) allows

More information

Unicenter TCPaccess FTP Server

Unicenter TCPaccess FTP Server Unicenter TCPaccess FTP Server Release Summary 6.0 This documentation and related computer software program (hereinafter referred to as the Documentation ) is for the end user s informational purposes

More information

CA Dispatch r11.7. Business value. Product overview. Delivery approach

CA Dispatch r11.7. Business value. Product overview. Delivery approach DATA SHEET CA Dispatch r11.7 CA Dispatch is an online, interactive report distribution management and archive repository system designed to reduce paper consumption and increase report distribution efficiency.

More information

CA Chorus for Security and Compliance Management Deep Dive

CA Chorus for Security and Compliance Management Deep Dive Mainframe Optimization and Modernization CA Chorus for Security and Compliance Management Deep Dive Maddalena Tosoni Principal Engineering Services Architect CA Chorus Recap Improve Staff Efficiency CA

More information

White paper September 2009. Realizing business value with mainframe security management

White paper September 2009. Realizing business value with mainframe security management White paper September 2009 Realizing business value with mainframe security management Page 2 Contents 2 Executive summary 2 Meeting today s security challenges 3 Addressing risks in the mainframe environment

More information

CA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services

CA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services PRODUCT SHEET CA Workload Automation Agents CA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services CA Workload Automation Agents extend the automation capabilities

More information

CA SOLVE:Central Service Desk for z/os

CA SOLVE:Central Service Desk for z/os PRODUCT SHEET CA SOLVE:Central Service Desk for z/os CA SOLVE:Central Service Desk for z/os CA SOLVE:Central Service Desk for z/os (CA SOLVE:Central for z/os) is a comprehensive service management solution

More information

CA View r11.7. Business value. Product overview. Delivery approach

CA View r11.7. Business value. Product overview. Delivery approach DATA SHEET CA View r11.7 CA View is an automated archival and retrieval system that provides immediate and flexible online viewing of mainframe and distributed output. Its repository is capable of housing

More information

Enforcive / Enterprise Security

Enforcive / Enterprise Security TM Enforcive / Enterprise Security End to End Security and Compliance Management for the IBM i Enterprise Enforcive / Enterprise Security is the single most comprehensive and easy to use security and compliance

More information

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management Table of Contents Executive Summary 1 SECTION 1: CHALLENGE 2 The Need for

More information

CA Workload Automation Agents for Mainframe-Hosted Implementations

CA Workload Automation Agents for Mainframe-Hosted Implementations PRODUCT SHEET CA Workload Automation Agents CA Workload Automation Agents for Mainframe-Hosted Operating Systems, ERP, Database, Application Services and Web Services CA Workload Automation Agents are

More information

IBM Tivoli Netcool Configuration Manager

IBM Tivoli Netcool Configuration Manager IBM Netcool Configuration Manager Improve organizational management and control of multivendor networks Highlights Automate time-consuming device configuration and change management tasks Effectively manage

More information

CA Process Automation

CA Process Automation PRODUCT SHEET: CA Process Automation we can CA Process Automation CA Process Automation enables enterprise organizations to design, deploy and administer automation of manual, resource-intensive and often

More information

Overview. Business value

Overview. Business value PRODUCT SHEET CA VM:Backup for z/vm CA VM:Backup for z/vm CA VM:Backup for z/vm (CA VM:Backup) provides an efficient and reliable means of backing up CMS and non-cms data in z/vm and mainframe Linux systems.

More information

CA Service Desk Manager - Mobile Enabler 2.0

CA Service Desk Manager - Mobile Enabler 2.0 This Document is aimed at providing information about the (CA SDM) Mobile Enabler and mobile capabilities that is typically not available in the product documentation. This is a living document and will

More information

CA MICS Resource Management r12.6

CA MICS Resource Management r12.6 PRODUCT SHEET CA MICS Resource Management CA MICS Resource Management r12.6 CA MICS Resource Management (CA MICS) is a comprehensive IT resource utilization management system designed to fulfill the information

More information

How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward?

How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward? SOLUTION BRIEF Content Aware Identity and Access Management May 2010 How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward? we can CA Content

More information

Dynamic Data Center Update:

Dynamic Data Center Update: 15293 Dynamic Data Center Update: System z and Data Center What Changed Since Boston? Mike Madden General Manager, CA Technologies March 11, 2014 No better time to be on the MAINFRAME 2 SHARE Anaheim 2014

More information

can I customize my identity management deployment without extensive coding and services?

can I customize my identity management deployment without extensive coding and services? SOLUTION BRIEF Connector Xpress and Policy Xpress Utilities in CA IdentityMinder can I customize my identity management deployment without extensive coding and services? agility made possible You can.

More information

Can I customize my identity management deployment without extensive coding and services?

Can I customize my identity management deployment without extensive coding and services? SOLUTION BRIEF CONNECTOR XPRESS AND POLICY XPRESS UTILITIES IN CA IDENTITY MANAGER Can I customize my identity management deployment without extensive coding and services? SOLUTION BRIEF CA DATABASE MANAGEMENT

More information

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications

More information

Logica Sweden provides secure and compliant cloud services with CA IdentityMinder TM

Logica Sweden provides secure and compliant cloud services with CA IdentityMinder TM CUSTOMER SUCCESS STORY Logica Sweden provides secure and compliant cloud services with CA IdentityMinder TM CUSTOMER PROFILE Industry: IT services Company: Logica Sweden Employees: 5,200 (41,000 globally)

More information

CA Workload Automation

CA Workload Automation PRODUCT SHEET: CA Workload Automation CA Workload Automation Improve the availability of critical IT workload processes and schedules enterprise-wide by leveraging real-time IT automation, embedded workflow,

More information

ROI Business Use Case. Cross-Enterprise Application Performance Management. Helps Reduce Costs & MTTR, Simplify Management, Improve Service Quality

ROI Business Use Case. Cross-Enterprise Application Performance Management. Helps Reduce Costs & MTTR, Simplify Management, Improve Service Quality ROI Business Use Case Cross-Enterprise Application Performance Management Helps Reduce Costs & MTTR, Simplify Management, Improve Service Quality Today s applications are complex, running across your network

More information

Netop Remote Control Security Server

Netop Remote Control Security Server A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days

More information

A to Z Information Services stands out from the competition with CA Recovery Management solutions

A to Z Information Services stands out from the competition with CA Recovery Management solutions Customer success story October 2013 A to Z Information Services stands out from the competition with CA Recovery Management solutions Client Profile Industry: IT Company: A to Z Information Services Employees:

More information

Unleash the Power of Mainframe Data in the Application Economy

Unleash the Power of Mainframe Data in the Application Economy Unleash the Power of Mainframe Data in the Application Economy Data Drives the Application Economy Data is the most valuable asset a business has, and the most important data lives on the mainframe. This

More information

CA Service Desk Manager

CA Service Desk Manager DATA SHEET CA Service Desk Manager CA Service Desk Manager (CA SDM), on-premise or on-demand, is designed to help you prevent service disruptions, better manage change risks, and provides a 360-degree

More information

CA Unified Infrastructure Management Server

CA Unified Infrastructure Management Server CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for

More information

CA VM:Operator r3. Product Overview. Business Value. Delivery Approach

CA VM:Operator r3. Product Overview. Business Value. Delivery Approach PRODUCT SHEET: CA VM:OPERATOR CA VM:Operator r3 CA VM:Operator is an automated console message management system for z/vm and mainframe Linux environments. It allows you to minimize human intervention

More information

agility made possible

agility made possible SOLUTION BRIEF CA Technologies and NetApp Integrated Service Automation Across the Data Center can you automate the provisioning and management of both virtual and physical resources across your data center

More information

CA Technologies optimizes business systems worldwide with enterprise data model

CA Technologies optimizes business systems worldwide with enterprise data model CUSTOMER SUCCESS STORY CA Technologies optimizes business systems worldwide with enterprise data model CLIENT PROFILE Industry: IT Organization: CA Technologies Employees: 13,600 Revenue: $4.8 billion

More information

CA Workload Automation Strategy and Roadmap. Bill Sherwin Principal Consultant EMEA Workload Automation Owner

CA Workload Automation Strategy and Roadmap. Bill Sherwin Principal Consultant EMEA Workload Automation Owner CA Workload Automation Strategy and Roadmap Bill Sherwin Principal Consultant EMEA Workload Automation Owner CA Workload Automation: Key component in successful enterprise IT management Service Service

More information

Sallie Mae slashes change management costs and complexity with CA SCM

Sallie Mae slashes change management costs and complexity with CA SCM CUSTOMER SUCCESS STORY Sallie Mae slashes change management costs and complexity with CA SCM CUSTOMER PROFILE Industry: Financial services Company: Sallie Mae Customers: 23 million Student loan portfolio:

More information

TECHNOLOGY BRIEF: PREVENTING UNAUTHORISED ACCESS TO CRITICAL SYSTEMS AND DATA. Colruyt ensures data privacy with Identity & Access Management.

TECHNOLOGY BRIEF: PREVENTING UNAUTHORISED ACCESS TO CRITICAL SYSTEMS AND DATA. Colruyt ensures data privacy with Identity & Access Management. TECHNOLOGY BRIEF: PREVENTING UNAUTHORISED ACCESS TO CRITICAL SYSTEMS AND DATA Colruyt ensures data privacy with Identity & Access Management. Table of Contents Executive Summary SECTION 1: CHALLENGE 2

More information

CA Oblicore Guarantee for Managed Service Providers

CA Oblicore Guarantee for Managed Service Providers PRODUCT SHEET CA Oblicore Guarantee for Managed Service Providers CA Oblicore Guarantee for Managed Service Providers Value proposition CA Oblicore Guarantee is designed to automate, activate and accelerate

More information

Table of Contents. Authors Wendy Wong, Senior Software Architect, and the SOLVE:Operations/Linux Connector team. Print Edition: WW180311

Table of Contents. Authors Wendy Wong, Senior Software Architect, and the SOLVE:Operations/Linux Connector team. Print Edition: WW180311 Table of Contents The Essentials 1 SECTION 1: ARCHITECTURE 2 CA Mainframe Connector for Linux on System z 2 What is it? 2 What does CA Mainframe Connector do? 2 How does CA Mainframe Connector work? 3

More information

ScaleMatrix safeguards 100 terabytes of data and continuity of cloud services with CA Technologies

ScaleMatrix safeguards 100 terabytes of data and continuity of cloud services with CA Technologies CUSTOMER SUCCESS STORY ScaleMatrix safeguards 100 terabytes of data and continuity of cloud services with CA Technologies CLIENT PROFILE Industry: IT services Company: ScaleMatrix Employees: 60 BUSINESS

More information

10 Steps to Establishing an Effective Email Retention Policy

10 Steps to Establishing an Effective Email Retention Policy WHITE PAPER: 10 STEPS TO EFFECTIVE EMAIL RETENTION 10 Steps to Establishing an Effective Email Retention Policy JANUARY 2009 Eric Lundgren INFORMATION GOVERNANCE Table of Contents Executive Summary SECTION

More information

CA Mobile Device Management 2014 Q1 Getting Started

CA Mobile Device Management 2014 Q1 Getting Started CA Mobile Device Management 2014 Q1 Getting Started This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

IBM WebSphere MQ File Transfer Edition, Version 7.0

IBM WebSphere MQ File Transfer Edition, Version 7.0 Managed file transfer for SOA IBM Edition, Version 7.0 Multipurpose transport for both messages and files Audi logging of transfers at source and destination for audit purposes Visibility of transfer status

More information

CA SiteMinder SSO Agents for ERP Systems

CA SiteMinder SSO Agents for ERP Systems PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security

More information

CA Service Desk On-Demand

CA Service Desk On-Demand PRODUCT BRIEF: CA SERVICE DESK ON DEMAND -Demand Demand is a versatile, ready-to-use IT support solution delivered On Demand to help you build a superior Request, Incident, Change and Problem solving system.

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

CA NSM System Monitoring Option for OpenVMS r3.2

CA NSM System Monitoring Option for OpenVMS r3.2 PRODUCT SHEET CA NSM System Monitoring Option for OpenVMS CA NSM System Monitoring Option for OpenVMS r3.2 CA NSM System Monitoring Option for OpenVMS helps you to proactively discover, monitor and display

More information

AVTech provides customers with end-to-end recovery management service with CA ARCserve solutions

AVTech provides customers with end-to-end recovery management service with CA ARCserve solutions CUSTOMER SUCCESS STORY AVTech provides customers with end-to-end recovery management service with CA ARCserve solutions CLIENT PROFILE Industry: ICT Company: Advanced Vision Technology (AVTech) Employees:

More information

Can My Identity Management Solution Quickly Adapt to Changing Business Requirements and Processes?

Can My Identity Management Solution Quickly Adapt to Changing Business Requirements and Processes? SOLUTION BRIEF CONFIG XPRESS UTILITY IN CA IDENTITY MANAGER Can My Identity Management Solution Quickly Adapt to Changing Business Requirements and Processes? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR

More information

KASIKORNBANK eliminates nearly 30,000 helpdesk calls a year with automated identity management

KASIKORNBANK eliminates nearly 30,000 helpdesk calls a year with automated identity management CUSTOMER SUCCESS STORY KASIKORNBANK eliminates nearly 30,000 helpdesk calls a year with automated identity management CUSTOMER PROFILE Industry: Financial services Company: KASIKORNBANK Employees: 16,193

More information

CA ControlMinder for Virtual Environments May 2012

CA ControlMinder for Virtual Environments May 2012 FREQUENTLY ASKED QUESTIONS May 2012 Top Ten Questions 1. What is?... 2 2. What are the key benefits of?... 2 3. What are the key capabilities of?... 2 4. Does this release include anything from the recently

More information

CA Technologies Healthcare security solutions:

CA Technologies Healthcare security solutions: CA Technologies Healthcare security solutions: Protecting your organization, patients, and information agility made possible Healthcare industry imperatives Security, Privacy, and Compliance HITECH/HIPAA

More information

SOLUTION BRIEF BIG DATA MANAGEMENT. How Can You Streamline Big Data Management?

SOLUTION BRIEF BIG DATA MANAGEMENT. How Can You Streamline Big Data Management? SOLUTION BRIEF BIG DATA MANAGEMENT How Can You Streamline Big Data Management? Today, organizations are capitalizing on the promises of big data analytics to innovate and solve problems faster. Big Data

More information

Consolidating security across platforms with IBM System z

Consolidating security across platforms with IBM System z IBM Software Thought Leadership White Paper September 2010 Consolidating security across platforms with IBM System z Protect your business-critical information by leveraging the mainframe as a security

More information

The Future of Workload Automation in the Application Economy

The Future of Workload Automation in the Application Economy The Future of Workload Automation in the Application Economy Success Requires Agility in the Application Economy The link between data center operations and business agility has never been stronger. If

More information

Achieving PCI Compliance with Red Hat Enterprise Linux. June 2009

Achieving PCI Compliance with Red Hat Enterprise Linux. June 2009 Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving

More information

Privileged Account Access Management: Why Sudo Is No Longer Enough

Privileged Account Access Management: Why Sudo Is No Longer Enough Access Control Excellence Privileged Account Access Management: Why Sudo Is No Longer Enough The new privileged access management solutions available on the market today provide highly efficient and effective

More information

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to

More information

Windows Least Privilege Management and Beyond

Windows Least Privilege Management and Beyond CENTRIFY WHITE PAPER Windows Least Privilege Management and Beyond Abstract Devising an enterprise-wide privilege access scheme for Windows systems is complex (for example, each Window system object has

More information

CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes.

CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes. TECHNOLOGY BRIEF: REDUCING COST AND COMPLEXITY WITH GLOBAL GOVERNANCE CONTROLS CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes. Table of Contents Executive

More information

The NIST Framework for Improving Critical Infrastructure Cybersecurity - An Executive Guide

The NIST Framework for Improving Critical Infrastructure Cybersecurity - An Executive Guide SOLUTION BRIEF NIST FRAMEWORK FOR IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY The NIST Framework for Improving Critical Infrastructure Cybersecurity - An Executive Guide SOLUTION BRIEF CA DATABASE

More information

Directory Integration in LANDesk Management Suite

Directory Integration in LANDesk Management Suite Directory Integration in LANDesk Management Suite A white-paper detailing the use of an LDAP Directory in an LANDesk Management Suite environment LANDesk Software Inc. Sam Merrill Technical Marketing Engineer

More information

Enforcive /Cross-Platform Audit

Enforcive /Cross-Platform Audit Enforcive /Cross-Platform Audit Enterprise-Wide Log Manager and Database Activity Monitor Real-time Monitoring Alert Center Before & After Change Image Custom Reports Enforcive's Cross-Platform Audit (CPA)

More information

CA Service Desk Manager

CA Service Desk Manager PRODUCT BRIEF: CA SERVICE DESK MANAGER CA Service Desk Manager CA SERVICE DESK MANAGER IS A VERSATILE, COMPREHENSIVE IT SUPPORT SOLUTION THAT HELPS YOU BUILD SUPERIOR INCIDENT AND PROBLEM MANAGEMENT PROCESSES

More information

CA Automation Suite for Data Centers

CA Automation Suite for Data Centers PRODUCT SHEET CA Automation Suite for Data Centers agility made possible Technology has outpaced the ability to manage it manually in every large enterprise and many smaller ones. Failure to build and

More information

Broadcloud improves competitive advantage with efficient, flexible and scalable disaster recovery services

Broadcloud improves competitive advantage with efficient, flexible and scalable disaster recovery services CUSTOMER SUCCESS STORY Broadcloud improves competitive advantage with efficient, flexible and scalable disaster recovery services CLIENT PROFILE Industry: IT services Company: Broadcloud Staff: 40-plus BUSINESS

More information

CA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam

CA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam CA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam (CAT-480) Study Guide Version 1.5 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials

More information

CA Chorus Software Manager

CA Chorus Software Manager CA Chorus Software Manager User Guide Release 5.1 Third Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

agility made possible

agility made possible SOLUTION BRIEF CA Mainframe Suite for IBM Rational Development and Test Environment for System z do you want to run your mainframe software from CA Technologies on IBM Rational Development and Test Environment

More information

Nordea saves 3.5 million with enhanced application portfolio management

Nordea saves 3.5 million with enhanced application portfolio management CUSTOMER SUCCESS STORY Nordea saves 3.5 million with enhanced application portfolio management CUSTOMER PROFILE Industry: Financial services Company: Nordea Bank Employees: 30,000 Total assets: 581 billion

More information

Directory-enabled Lights-Out Management

Directory-enabled Lights-Out Management Directory-enabled Lights-Out Management white paper Abstract... 2 Remote management products... 2 Business needs... 3 Customer environment... 3 Benefits... 3 Directory architecture... 4 Overview... 4 Objects...

More information